CVE-2023-39143
PaperCut NG vulnerability analysis and mitigation

Overview

CVE-2023-39143 is a critical vulnerability affecting PaperCut NG and PaperCut MF print management software versions before 22.1.3 running on Windows systems. The vulnerability was discovered in May 2023 and patched in July 2023. It affects the application server component of PaperCut installations, allowing unauthenticated attackers to perform path traversal attacks (Horizon3 Advisory, NVD).

Technical details

The vulnerability has a CVSS v3.1 base score of 9.8 (CRITICAL) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. It involves multiple chained issues including path traversal vulnerabilities in the WebDAV endpoint and CustomReportExample servlet that allow bypassing authentication. The vulnerability stems from improper sanitization of backslash characters in paths on Windows systems (Horizon3 Writeup).

Impact

The vulnerability enables unauthenticated attackers to read, delete, and upload arbitrary files to the PaperCut application server. When external device integration is enabled (a common configuration), this can lead to remote code execution. Based on real-world data, the majority of PaperCut installations run on Windows with external device integration enabled, making them potentially vulnerable (Horizon3 Advisory).

Mitigation and workarounds

The primary mitigation is to upgrade to PaperCut NG/MF version 22.1.3 or later. For organizations unable to upgrade immediately, a workaround is available by configuring an allowlist of device IP addresses that are permitted to communicate with the PaperCut server. This can be implemented using the "IP Address Allow-listing" section in PaperCut's security best practices guide (PaperCut Security Bulletin).

Additional resources


SourceThis report was generated using AI

Related PaperCut NG vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-8404HIGH7.8
  • PaperCut NGPaperCut NG
  • cpe:2.3:a:papercut:papercut_mf
NoYesSep 26, 2024
CVE-2024-4712HIGH7.8
  • PaperCut NGPaperCut NG
  • cpe:2.3:a:papercut:papercut_mf
NoYesMay 14, 2024
CVE-2023-39470HIGH7.2
  • PaperCut NGPaperCut NG
  • cpe:2.3:a:papercut:papercut_ng
NoYesNov 22, 2024
CVE-2024-9672MEDIUM6.3
  • PaperCut NGPaperCut NG
  • cpe:2.3:a:papercut:papercut_mf
NoYesDec 10, 2024
CVE-2024-8405MEDIUM5.5
  • PaperCut NGPaperCut NG
  • cpe:2.3:a:papercut:papercut_mf
NoYesSep 26, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management